heroui logo

Okta Multiple User Rejected MFA Push Request

Anvilogic Forge

View Source
Summary
This rule focuses on detecting a pattern where a user has rejected multiple push notifications for Multi-Factor Authentication (MFA) within a short time frame (10 minutes). Such behavior may indicate attempted unauthorized access, especially if a recognized threat actor like LUCR-3 is associated with it. The detection is implemented using a Splunk query, which checks for events of type `user.mfa.okta_verify.deny_push` and counts occurrences of authentication failures. It aggregates the results to identify users experiencing multiple rejections, alerting security teams about potential account compromise attempts. Notably, this type of detection aligns with the strategy of identifying 'initial-access' techniques, particularly valid account abuse (T1078).
Categories
  • Identity Management
  • Cloud
  • Application
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1078
Created: 2024-02-09